<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Insecure Management Interface on a Modem in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/Insecure-Management-Interface-on-a-Modem/m-p/29242#M1878</link>
    <description>&lt;P&gt;Uh.. buy a new modem?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Craig&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 24 Oct 2019 16:50:07 GMT</pubDate>
    <dc:creator>CraginS</dc:creator>
    <dc:date>2019-10-24T16:50:07Z</dc:date>
    <item>
      <title>Insecure Management Interface on a Modem</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Insecure-Management-Interface-on-a-Modem/m-p/29230#M1877</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Good morning, y'all.&amp;nbsp; If a modem vendor sells an internet-facing device which has an HTTP interface that supports neither SSL nor TLS (only 80 or 8080), and HTTP is the only method of remotely accessing this device without going through several undocumented steps to crank up SSH... and if this is the only solution we can have before a go-live next week, what's a safe minimum number of characters for the admin password?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If you think it's weird that SSH isn't already configured, you'll really think it's strange knowing WAN-side HTTP can't be &lt;EM&gt;turned&lt;/EM&gt; &lt;EM&gt;off&lt;/EM&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;thanks!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Oct 2019 12:48:00 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Insecure-Management-Interface-on-a-Modem/m-p/29230#M1877</guid>
      <dc:creator>ericgeater</dc:creator>
      <dc:date>2019-10-24T12:48:00Z</dc:date>
    </item>
    <item>
      <title>Re: Insecure Management Interface on a Modem</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Insecure-Management-Interface-on-a-Modem/m-p/29242#M1878</link>
      <description>&lt;P&gt;Uh.. buy a new modem?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Craig&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Oct 2019 16:50:07 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Insecure-Management-Interface-on-a-Modem/m-p/29242#M1878</guid>
      <dc:creator>CraginS</dc:creator>
      <dc:date>2019-10-24T16:50:07Z</dc:date>
    </item>
    <item>
      <title>Re: Insecure Management Interface on a Modem</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Insecure-Management-Interface-on-a-Modem/m-p/29243#M1879</link>
      <description>&lt;P&gt;There is no safe number. You are one packet away from a successful replay-attack.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would use the longest string supported by the vendor until such time that the vendor can provide a better solution or I was able to switch vendors.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Oct 2019 16:54:27 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Insecure-Management-Interface-on-a-Modem/m-p/29243#M1879</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2019-10-24T16:54:27Z</dc:date>
    </item>
    <item>
      <title>Re: Insecure Management Interface on a Modem</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Insecure-Management-Interface-on-a-Modem/m-p/29245#M1880</link>
      <description>&lt;P&gt;I called their support desk, and they understand the nature of my complaint.&amp;nbsp; I'm hoping they know of a solution that wasn't spelled out in their Quick Start guide.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Oct 2019 16:55:28 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Insecure-Management-Interface-on-a-Modem/m-p/29245#M1880</guid>
      <dc:creator>ericgeater</dc:creator>
      <dc:date>2019-10-24T16:55:28Z</dc:date>
    </item>
    <item>
      <title>Re: Insecure Management Interface on a Modem</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Insecure-Management-Interface-on-a-Modem/m-p/29248#M1882</link>
      <description>&lt;P&gt;I would imagine the greater threat to be having always-on access to the HTTP interface, and therefore unlimited tries to guess the password.&amp;nbsp; How would a replay attack work here? I think I've forgotten that... it's been a while.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Oct 2019 17:00:41 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Insecure-Management-Interface-on-a-Modem/m-p/29248#M1882</guid>
      <dc:creator>ericgeater</dc:creator>
      <dc:date>2019-10-24T17:00:41Z</dc:date>
    </item>
    <item>
      <title>Re: Insecure Management Interface on a Modem</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Insecure-Management-Interface-on-a-Modem/m-p/29252#M1883</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/136236425"&gt;@ericgeater&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;&lt;SPAN&gt;If a modem vendor sells an internet-facing device which has an HTTP interface that supports neither SSL nor TLS (only 80 or 8080), and HTTP is the only method of remotely accessing this device without going through several undocumented steps to crank up SSH... and if this is the only solution we can have before a go-live next week, what's a safe minimum number of characters for the admin password?&lt;/SPAN&gt;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Like &lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/311867713"&gt;@denbesten&lt;/a&gt;&amp;nbsp;said, changing the length of your password isn't going to make any difference here.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/136236425"&gt;@ericgeater&lt;/a&gt;&amp;nbsp;wrote:&lt;P&gt;&lt;SPAN&gt;... you'll really think it's strange knowing WAN-side HTTP can't be &lt;EM&gt;turned&lt;/EM&gt; &lt;EM&gt;off&lt;/EM&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;If the ability to login via the network can't be disabled, it's a surprise &amp;amp; a big concern. If the vendor has been so lax with the security of this product, I'd suggest you also do an online lookup to see if it has other security concerns.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Information Security policies you set in your organization should dictate minimal security requirements, and state how to handle exceptions.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Treat this as a risk. Prepare a report portraying the impact &amp;amp; probability in a matrix, say that the vendor has offered no solution &amp;amp; there's nothing much to mitigate this, and finally, recommend that the modem be replaced.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Send the report to management, after which&amp;nbsp;they will have to decide whether to accept the risk or treat it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is essentially a 'cover your a**' strategy --- if there's any negative impact due to this risk, you might end up taking the fall if you never brought it to management's attention.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;(To play it absolutely safe, get them to give you a written confirmation about accepting the risk before the go-live.)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Oct 2019 17:51:41 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Insecure-Management-Interface-on-a-Modem/m-p/29252#M1883</guid>
      <dc:creator>Shannon</dc:creator>
      <dc:date>2019-10-24T17:51:41Z</dc:date>
    </item>
    <item>
      <title>Re: Insecure Management Interface on a Modem</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Insecure-Management-Interface-on-a-Modem/m-p/29256#M1884</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The vulnerabilities in this situation would be the inability to disable HTTP logins via the network, and the lack of support for SSH.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The threat is these being exploited to obtain the password by capturing the data in transit and re-using it, or simply initiating a new session for an unauthorized login to the device.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To supplement my previous post, you could implement deterrent &amp;amp; detective controls --- setting up a banner on the device, and configuring logging / alerts --- but I feel that if you can't use a preventive control in the 1st place, there's not much use in the others.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;(Anyways, put it all in a report, and throw the ball in your management's court&amp;nbsp;&lt;img id="manwink" class="emoticon emoticon-manwink" src="https://community.isc2.org/i/smilies/16x16_man-wink.png" alt="Man Wink" title="Man Wink" /&gt;)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Oct 2019 18:09:52 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Insecure-Management-Interface-on-a-Modem/m-p/29256#M1884</guid>
      <dc:creator>Shannon</dc:creator>
      <dc:date>2019-10-24T18:09:52Z</dc:date>
    </item>
    <item>
      <title>Re: Insecure Management Interface on a Modem</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Insecure-Management-Interface-on-a-Modem/m-p/29265#M1886</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/136236425"&gt;@ericgeater&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;How would a replay attack work here? I think I've forgotten that... it's been a while.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;I'm was being brief in my verbiage.&amp;nbsp; I see three primary attack scenarios:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;If somebody could insert themselves between you and your device, they could with a simple packet capture learn your password, which they could then later use to log themselves in.&amp;nbsp; This is what I was calling a replay attack -- collecting and reusing part of your session.&lt;/LI&gt;&lt;LI&gt;A brute-force attack, wherein somebody repeatedly tries to login using a list of passwords.&amp;nbsp; Length will help here, which is why I suggested "as long as supported".&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;An authentication-bypass attack whereby somebody finds/exploits a flaw in the modem that grants them non-credentialed access.&amp;nbsp; Think &lt;A href="http://bill@sartrix.comhttps://xkcd.com/327/" target="_blank" rel="noopener"&gt;Bobby Tables&lt;/A&gt; against the login page and you have the right idea.&amp;nbsp;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And as you identified, the best solution is to not expose admin interfaces to the Internet.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If your goal is internet-based out-of-band management, I would suggest some sort of filter/ACL that only allows connections from your own source IP addresses.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Oct 2019 22:32:20 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Insecure-Management-Interface-on-a-Modem/m-p/29265#M1886</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2019-10-24T22:32:20Z</dc:date>
    </item>
    <item>
      <title>Re: Insecure Management Interface on a Modem</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Insecure-Management-Interface-on-a-Modem/m-p/29314#M1898</link>
      <description>&lt;P&gt;I appreciate your follow-up answer, btw, because I was thinking more along "password capture" than "replay attack". To that end, thanks for the added detail.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am going to take&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/783078713"&gt;@Shannon&lt;/a&gt;'s advice and get management to sign off.&amp;nbsp; I didn't mention, by the way, that the next (and ONLY) item behind the modem is a firewall appliance.&amp;nbsp; The modem only NATs traffic, and has no role or participation in the overall security.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the replies, everyone.&lt;/P&gt;</description>
      <pubDate>Sun, 27 Oct 2019 17:00:15 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Insecure-Management-Interface-on-a-Modem/m-p/29314#M1898</guid>
      <dc:creator>ericgeater</dc:creator>
      <dc:date>2019-10-27T17:00:15Z</dc:date>
    </item>
  </channel>
</rss>

